Marc Ph. Stoecklin

According to our database1, Marc Ph. Stoecklin authored at least 35 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status.
IACR Cryptol. ePrint Arch., 2021

AI vs. AI: Exploring the Intersections of AI and Cybersecurity.
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021

2020
Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2018
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Cross-Stack Threat Sensing for Cyber Security and Resilience.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Hidden in Plain Sight: Filesystem View Separation for Data Integrity and Deception.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Dressed up: Baiting Attackers through Endpoint Service Projection.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Threat Intelligence Computing.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
POSTER: Hidden in Plain Sight: A Filesystem for Data Integrity and Confidentiality.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016

Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev., 2016

Security 360°: Enterprise security for the cognitive era.
IBM J. Res. Dev., 2016

Scalable malware classification with multifaceted content features and threat intelligence.
IBM J. Res. Dev., 2016

Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
IBM J. Res. Dev., 2016

Security intelligence for industrial control systems.
IBM J. Res. Dev., 2016

Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Detecting Malicious Exploit Kits using Tree-based Similarity Searches.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

2014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur., 2014

Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Stream computing for large-scale, multi-channel cyber threat analytics.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

2013
Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

2012
Real-time creation of bitmap indexes on streaming network data.
VLDB J., 2012

2011
Traffic Anomaly Detection and Diagnosis on the Network Flow Level.
PhD thesis, 2011

2010
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic.
Proc. VLDB Endow., 2010

A flow trace generator using graph-based traffic classification techniques.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
Histogram-based traffic anomaly detection.
IEEE Trans. Netw. Serv. Manag., 2009

On the 95-Percentile Billing Method.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

2008
The eternal sunshine of the sketch data structure.
Comput. Networks, 2008

A Two-Layered Anomaly Detection Technique Based on Multi-modal Flow Behavior Models.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

2006
Re-visited: Denial of Service Resilient Access Control for Wireless Sensor Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

Anomaly detection by finding feature distribution outliers.
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006


  Loading...